ID Authentication in PTPM and Public Key Cryptography in Cloud Environment

被引:0
|
作者
Xia, Hui [1 ]
机构
[1] Shenyang Normal Univ, Software Coll, Shenyang, Liaoning, Peoples R China
关键词
cloud computing; ID authentication; PTPM; certificateless public key cryptography;
D O I
10.1109/ICISCE.2018.00061
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To tackle the problems of security threat and the shortcomings in the process of ID authentication between user and cloud, this paper applies Portable TPM chip and certificateless public key cryptography for the first time to solve the issues in the cloud environment, and proposes a scheme for bidirectional ID authentication between user and cloud. Compared with previous authentication schemes, the proposed scheme has the several advantages. First, based on the unique identity of user and cloud by the identity management mechanism, portable TPM can not only achieves secure and trusted terminal platform, which ensures the authentication result between user and cloud is correct and valid, but also supports the objectives of ID authentication between user and cloud in user's any terminal device. Furthermore, Dual-factor ID authentication (password + key) is implemented with certificateless public key signature algorithm provided by the new scheme. Finally, security proof and performance analysis show that this proposed scheme has the security level of EUF-CMA, and the computation overhead of ID authentication between user and cloud is significantly improved.
引用
收藏
页码:256 / 260
页数:5
相关论文
共 50 条
  • [1] ID-Authentication Based on PTPM and Certificateless Public-Key Cryptography in Cloud
    Xia, Hui
    Yang, Weiji
    International Journal of Network Security, 2021, 23 (06) : 952 - 961
  • [2] Distributed authentication in Kerberos using public key cryptography
    Sirbu, MA
    Chuang, JCI
    1997 SYMPOSIUM ON NETWORK AND DISTRIBUTED SYSTEM SECURITY, PROCEEDINGS, 1997, : 134 - 141
  • [3] PASSWORD AUTHENTICATION USING PUBLIC-KEY CRYPTOGRAPHY
    HARN, L
    HUANG, D
    LAIH, CS
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 1989, 18 (12) : 1001 - 1017
  • [4] Mutual Authentication for IoT Smart Environment Using Certificate-less Public Key Cryptography
    Bala, Dania Qara
    Maity, Soumyadev
    Jena, Sanjay Kumar
    2017 IEEE 3RD INTERNATIONAL CONFERENCE ON SENSING, SIGNAL PROCESSING AND SECURITY (ICSSS), 2017, : 29 - 34
  • [5] Public key versus symmetric key cryptography in client–server authentication protocols
    An Braeken
    International Journal of Information Security, 2022, 21 : 103 - 114
  • [6] Public key versus symmetric key cryptography in client-server authentication protocols
    Braeken, An
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2022, 21 (01) : 103 - 114
  • [7] Fragile authentication watermark combined with image feature and public key cryptography
    Li, XQ
    Xue, XY
    2004 7TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS, VOLS 1-3, 2004, : 2286 - 2289
  • [8] Research on Key Technology of Authentication and Key Negotiation in Cloud Computing Environment
    Wang Linjing
    Zhao Chunxia
    PROCEEDINGS OF THE 2015 3RD INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 35 : 246 - 250
  • [9] An ID-based node key management scheme based on PTPM in MANETs
    Yang, Guang
    Liu, Jiqiang
    Han, Lei
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (15) : 2816 - 2826
  • [10] Authentication and ID-Based Key Management Protocol in Pervasive Environment
    Moon, Jong Sik
    Park, Jong Hyuk
    Lee, Deok Gyu
    Lee, Im-Yeong
    WIRELESS PERSONAL COMMUNICATIONS, 2010, 55 (01) : 91 - 103